Contents |
---|
|
Minimum Network Connectivity Requirements
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Required for Insurance |
---|---|---|---|---|---|
1. Access control measures for controlled electronic information resources |
Required |
Required |
Required |
III.C.2.b |
|
2. Encrypted transmission of restricted data including passwords |
Required |
Required |
Required |
III.C.2.b.i |
|
3. Software updates / patch management |
Required |
Required |
Required |
|
|
4. Malicious software protection (III.C.2.c.iii; IV.D) |
Required |
Required |
Required |
(III.C.2.c.iv |
|
5. Removal of unnecessary services |
Required |
Required |
Required |
IV.E |
|
6. Host-based firewalls |
Required |
Required |
Required |
III.C.2.d |
|
7. No unauthorized email relays |
Required |
Required |
Required |
IV.G |
|
8. No unauthorized, unauthenticated proxy servers |
Required |
Required |
Required |
IV.H |
|
9. Physical security and session timeout |
Required |
Required |
Required |
III.C.2.b.ii |
|
Administrative Controls
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Required for Insurance |
---|---|---|---|---|---|
Risk assessment, asset inventory and classification; Identification of systems storing and accessing data (III.B) |
Required |
Recommended |
Recommended |
|
|
Formal proprietor authorization for sharing data (III.C, 4th paragraph) |
Required |
Recommended |
Optional |
|
|
Procedures to inform staff of information security responsibilities. (III.C.1.a) |
Required |
Required |
Required |
|
|
Procedures for providing privileged accounts, review of personnel assignments for appropriate classification, security responsibilities, and separation of duties (III.C.1) |
Required |
Recommended |
Optional |
|
|
Background checks (III.C.1.b; III.F) |
Required |
Recommended |
Optional |
|
|
Third party agreements with data security language (III.F) |
Required |
Recommended |
Optional |
|
|
Take appropriate personnel/disciplinary action for violations of law or policy (III.C.1.c) |
Required |
Required |
Required |
|
|
Education and security awareness training (III.E) |
Required |
Recommended |
Recommended |
|
|
Operational Controls
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Required for Insurance |
---|---|---|---|---|---|
Secure and accountable means of authorization and authentication (III.C.2.a) |
Required |
Required |
Optional |
|
|
Prompt modification or termination of access or access levels in response to authorization changes (III.C.1) |
Required |
Required |
Optional |
|
|
Password guidelines and password vulnerability assessment (III.C.2.b.i) |
Required |
Required |
Required |
|
|
Delete, redact or de-identify data whenever possible (III.C, |
Required |
Recommended |
Optional |
||
Do not store data on portable devices (III.C.3.e) |
Required |
Recommended |
Optional |
|
|
Incident response planning and notification procedures (III.D) |
Required |
Required |
Required |
|
|
Access and activity audit and logging procedures, including access attempts and privileged access (III.C.2.b.iii; III.C.2.f; Appendix D) |
Required |
Required for financial instruments; otherwise recommended |
Optional |
|
|
Application security: |
Required |
Required |
Recommended |
|
|
Authorized, documented change management procedures (III.C.2.e) |
Required |
Recommended |
Optional |
|
|
Backup systems supporting essential activities (III.C.2.c.ii) |
Required |
Required |
Required |
|
|
Technical Controls
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Required for Insurance |
---|---|---|---|---|---|
Network firewalls and IDS/IPS (III.C.2.d) |
Required |
Recommended |
Optional |
|
|
Encryption:
|
Required |
Recommended |
Optional |
|
|
Ensure proper user authentication and authorization for users and administrators on all systems (III.C.2.b) |
Required |
Required |
Recommended |
|
|
Centralized log management, alerting on improper activity, and log retention (III.C.2.b) |
Required |
Recommended |
Optional |
|
|
Physical Controls
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Required for Insurance |
---|---|---|---|---|---|
Physical access controls; Facility access controls (III.C.3.b) |
Required |
Required |
Required |
|
|
Disposal and re-use: |
Required |
Required |
Recommended |
|
|
Physical security for portable devices and media (III.C.3.e) |
Required |
Recommended |
Optional |
|
|
Track reassignment or movement of devices and stock inventories, including financial instruments, such as check stock and produced checks (III.C.3.c) |
Required |
Required for financial instruments; otherwise recommended |
Optional |
|
|
Document repairs and modifications to physical components of the facility related to security, such as hardware, walls, doors, and locks (III.C.3.c) |
Required |
Required for financial instruments; otherwise recommended |
Optional |
|
|
Disaster Recovery and Business Continuity Plan (III.C.3.a) |
Required |
Recommended |
Optional |
|
|